(Cat? OR feline) AND NOT dog?
Cat? W/5 behavior
(Cat? OR feline) AND traits
Cat AND charact*

This guide provides a more detailed description of the syntax that is supported along with examples.

This search box also supports the look-up of an IP.com Digital Signature (also referred to as Fingerprint); enter the 72-, 48-, or 32-character code to retrieve details of the associated file or submission.

Concept Search - What can I type?

For a concept search, you can enter phrases, sentences, or full paragraphs in English. For example, copy and paste the abstract of a patent application or paragraphs from an article.

Concept search eliminates the need for complex Boolean syntax to inform retrieval. Our Semantic Gist engine uses advanced cognitive semantic analysis to extract the meaning of data. This reduces the chances of missing valuable information, that may result from traditional keyword searching.

Publishing Venue

Abstract

Described is a new method to automatically provision a virtual machine locally or remotely and give the user access to this virtual machine.

Country

Undisclosed

Language

English (United States)

This text was extracted from a PDF file.

At least one non-text object (such as an image or picture) has been suppressed.

This is the abbreviated version, containing approximately
53% of the total text.

Page 1 of 3

Automatic Virtual Machine provisioning

When a user connects to the infrastructure from a non identified machine, he lands on a
Web Site. After being authenticated, he specifies the physical and logical resources he
wants to access. Physical resources definition includes: architecture, number of CPUs,
amount of memory, etc. Logical resource definition refers to the name of one of the
virtual machines the user owns.

Once the request is specified, the backend system sets up a partition on a
multi-processors machine, allocating the resources defined in the request. The next step
is to carve the disk resources to provision the virtual machine. Once the virtual machine
is provisioned on the disk resource, the disk is attached to the partition and the machine
is booted. After the boot process completes, the security is set and the user is given full
access to the partition and the virtual machine.

When a user connects to the infrastructure using an already identified machine, the
backend system retrieves the virtual machines associated with this particular user and
checks the level of the virtual machine on the user's machine. If the system detects that
some differences exist, a series of actions are performed to put the virtual images in
sync.

The figure below shows more in detail the provisioning process. Through the Web site
access, the user accesses a partition provisioned with the virtual machine and attached
to the local partition. The virtual machine belonging to the user is pulled off the backend
storage, a dedicated storage resource is carved out the pool of storage resource and the
virtual machine is provisioned on the storage resource. Once done, the storage is
attached to the partition.